SlideShare a Scribd company logo
1 of 4
Download to read offline
Maximize network security and IT operational efficiency powered by Device Platform Intelligence
REAL-TIM
E
CONTEXT-BASED
NETWORK CONTROL
Device,User
IP/MAC, Switch Port, SSID, Desktop Configuration
PolicyCom
pliance
VENDOR-AGNOSTIC
DEVICE
PLATFORM
INTELLIGENCE
ACCESS
Sees every connected device holistically
Controls all connected devices contextually
•	 Identifies all network-enabled devices and their attributes
•	 Views from all perspectives (Device, IP, Switch, WLAN)
•	 Assesses the compliance state of all connected devices
•	 Layer 2 based sensing technology for accurate detection of device platform
- Not just “Android phone” but “Samsung Galaxy S6 mobile phone”
•	 Manages the entire lifecycle of all IP-enabled devices
- Device Platform Identify
- Device Platform Context
- Device Platform Risk
•	 Expands visibility into IT/OT convergence
- IoT, ICS, FAB, SCADA
•	 Enforces granular policies to regulate access
•	 Controls endpoints’ systems configuration and network access
•	 Tracks endpoint activities and maintain IT security baseline
MobileAccess Point
IoT
Switch
PC
IDENTI
TY C
ONTEXT
RISK
DPI
Genian NAC helps maintain smart visibility & control of all network-enabled devices and
ensures they are operating at the highest level of security and compliance
Next-Gen Network Access Control for the IoT era
Automates daily IT security tasks easily
•	 Automates on-boarding process with workflows, approvals, notifications
•	 Removes IT security silos by integrating with third-party solutions
•	 Automates the incident response and mitigation process
Genians Device Platform Intelligence (DPI), which provides Next-generation
device fingerprinting for the IoT era, combines technology information with
business context to understand where vulnerabilities may exist. This demands
not only a more comprehensive view of the devices themselves but also better
understanding of risk indicators.
More than just device fingerprinting
Sees all connected “things” and their compliance status
NETWORK SURVEILLANCE
•	 Contextual access information (What, Who, When, Where, and How)
•	 Network Information (State, Trend, Anomaly) via Network Sensor
•	 Endpoint configuration and compliance status via Agent (e.g. Windows Updates)
Manages IP/MAC in real time
IP ADDRESS MANAGEMENT
•	 Identifies the usage of all IP addresses for each network segment
•	 Manages IP addresses (Allow, Deny, Lease, Assign) and MAC addresses (Whitelist/Blacklist)
•	 Prevents IP conflicts and manages IP ownership
IP
Responds immediately
NETWORK ACCESS CONTROL
•	 Condition-based grouping (Over 500 predefined conditions)
•	 Policy assignment based on the status change of endpoint compliance
•	 End-to-end access control inside of LAN
Identifies who accesses your network
USER AUTHENTICATION
•	 Captive Web Portal (Pre/Post-admission activities)
•	 Built-in RADIUS server
•	 Integration with external user databases (e.g. AD, Oracle, MySQL, CSV, G-Suite, MS 365)
Secures where it connects
SWITCH PORT MANAGEMENT
•	 Sees how many devices are connected to specific port and their connection status
•	 Monitors Switch port status (e.g. Up/down, Security, 802.1x, VLAN)
•	 Controls any ports connected to non-compliant devices
Automates your day-to-day IT operations easily
IT SECURITY AUTOMATION
•	 On-boarding Process (BYOD, Guest, IP provisioning, Peripheral Device Usage)
•	 Access Approval Request (Security & Privacy Consent, User/Device Registration, IP Request)
•	 System Integration (via RESTful API, Webhook, Syslog)
Ensures the highest levels of security and compliance
DESKTOP MANAGEMENT
•	 Desktop Configuration Management (e.g. Security Settings, Internet Options, NIC, DNS)
•	 OS Updates Management (Windows, macOS)
•	 Application Management (Deploy, Update, Delete)
•	 External Device Control (e.g. USB Thumb-drive, CD-ROM, External-HDD)
Controls Wifi Security and Wireless Access
WLAN MANAGEMENT
•	 Monitors all SSIDs in your network and identifies who connects to which SSIDs
•	 Discovers rogue and mis-configured wireless APs
•	 Discovers the device locations via Network Sensor or Agent
•	 Built-in RADIUS Server (EAP Support)
You Choose, We Deliver!
Genians can provide both on-premise and cloud-based deployment options. It also provides a more dedicated
solution for MSP and MSSP businesses, which can secure multi-tenancy environments more effectively and deliver
cloud-based management service packages for ease of deployment and ongoing management.
On-Premises
Get the software for your business needs
Cloud-Managed
Run your Policy Server in the cloud
CSP-Ready
Build your own NAC-as-a-Service
In Genians We Trust
North America
50 High Street, Suite 45
North Andover, MA, 01845
United States of America
hello@genians.com
+1-617-307-4090
East Asia
ACE Pyeongchon Tower, 8th floor
361 Simindaero, Dongan-gu Anyang-si
Gyeonggi-do, South Korea
geni@genians.com
+82-31-422-3823
Genians (KOSDAQ: 263860) reimagines Network Access Control by using Device Platform Intelligence to monitor the entire lifecycle of all
network-connected devices to ensure the highest levels of IT security, availability, resilience, and agility. Genians is working to build a better
security culture in the connected world by teaming up with global communities and industry leaders around the world.
TOGETHER, MORE SECURE.
Over the last 13 years, Genians has supported more than 1,100 customers around the world and secured
millions of endpoint connections in organizations of all sizes and industries, including global Fortune 500
companies, the government, the military, energy, finance, healthcare, education, and beyond.
Genians Named a Representative Vendor in
Gartner 2018 Market Guide for Network Access Control
“Thanks to Genians’ non-disruptive sensing technology powered by its Device Platform Intelligence, we can see what,
who, when, where, and how is connected to our network. It’s ‘Crystal Clear’! This real-time visibility enables us to manage
and enforce various types of endpoint devices more precisely and just in time. Yes, we are ready for the IoT era!”

More Related Content

What's hot

Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial InternetAlex Lavell
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape PresentationDoug McTighe
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014iotisrael
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamFelipe Prado
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldCodiax
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 

What's hot (20)

What is NAC
What is NACWhat is NAC
What is NAC
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape Presentation
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 

Similar to Genian NAC Overview

Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...Perydot
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotServicePilot
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheetAdvantec Distribution
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draftenergyvijay
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfssusera181ef
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 

Similar to Genian NAC Overview (20)

Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
IoT Sense
IoT Sense IoT Sense
IoT Sense
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdf
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Genian NAC Overview

  • 1. Maximize network security and IT operational efficiency powered by Device Platform Intelligence REAL-TIM E CONTEXT-BASED NETWORK CONTROL Device,User IP/MAC, Switch Port, SSID, Desktop Configuration PolicyCom pliance VENDOR-AGNOSTIC DEVICE PLATFORM INTELLIGENCE ACCESS Sees every connected device holistically Controls all connected devices contextually • Identifies all network-enabled devices and their attributes • Views from all perspectives (Device, IP, Switch, WLAN) • Assesses the compliance state of all connected devices • Layer 2 based sensing technology for accurate detection of device platform - Not just “Android phone” but “Samsung Galaxy S6 mobile phone” • Manages the entire lifecycle of all IP-enabled devices - Device Platform Identify - Device Platform Context - Device Platform Risk • Expands visibility into IT/OT convergence - IoT, ICS, FAB, SCADA • Enforces granular policies to regulate access • Controls endpoints’ systems configuration and network access • Tracks endpoint activities and maintain IT security baseline MobileAccess Point IoT Switch PC IDENTI TY C ONTEXT RISK DPI Genian NAC helps maintain smart visibility & control of all network-enabled devices and ensures they are operating at the highest level of security and compliance Next-Gen Network Access Control for the IoT era Automates daily IT security tasks easily • Automates on-boarding process with workflows, approvals, notifications • Removes IT security silos by integrating with third-party solutions • Automates the incident response and mitigation process Genians Device Platform Intelligence (DPI), which provides Next-generation device fingerprinting for the IoT era, combines technology information with business context to understand where vulnerabilities may exist. This demands not only a more comprehensive view of the devices themselves but also better understanding of risk indicators. More than just device fingerprinting
  • 2. Sees all connected “things” and their compliance status NETWORK SURVEILLANCE • Contextual access information (What, Who, When, Where, and How) • Network Information (State, Trend, Anomaly) via Network Sensor • Endpoint configuration and compliance status via Agent (e.g. Windows Updates) Manages IP/MAC in real time IP ADDRESS MANAGEMENT • Identifies the usage of all IP addresses for each network segment • Manages IP addresses (Allow, Deny, Lease, Assign) and MAC addresses (Whitelist/Blacklist) • Prevents IP conflicts and manages IP ownership IP Responds immediately NETWORK ACCESS CONTROL • Condition-based grouping (Over 500 predefined conditions) • Policy assignment based on the status change of endpoint compliance • End-to-end access control inside of LAN Identifies who accesses your network USER AUTHENTICATION • Captive Web Portal (Pre/Post-admission activities) • Built-in RADIUS server • Integration with external user databases (e.g. AD, Oracle, MySQL, CSV, G-Suite, MS 365) Secures where it connects SWITCH PORT MANAGEMENT • Sees how many devices are connected to specific port and their connection status • Monitors Switch port status (e.g. Up/down, Security, 802.1x, VLAN) • Controls any ports connected to non-compliant devices
  • 3. Automates your day-to-day IT operations easily IT SECURITY AUTOMATION • On-boarding Process (BYOD, Guest, IP provisioning, Peripheral Device Usage) • Access Approval Request (Security & Privacy Consent, User/Device Registration, IP Request) • System Integration (via RESTful API, Webhook, Syslog) Ensures the highest levels of security and compliance DESKTOP MANAGEMENT • Desktop Configuration Management (e.g. Security Settings, Internet Options, NIC, DNS) • OS Updates Management (Windows, macOS) • Application Management (Deploy, Update, Delete) • External Device Control (e.g. USB Thumb-drive, CD-ROM, External-HDD) Controls Wifi Security and Wireless Access WLAN MANAGEMENT • Monitors all SSIDs in your network and identifies who connects to which SSIDs • Discovers rogue and mis-configured wireless APs • Discovers the device locations via Network Sensor or Agent • Built-in RADIUS Server (EAP Support) You Choose, We Deliver! Genians can provide both on-premise and cloud-based deployment options. It also provides a more dedicated solution for MSP and MSSP businesses, which can secure multi-tenancy environments more effectively and deliver cloud-based management service packages for ease of deployment and ongoing management. On-Premises Get the software for your business needs Cloud-Managed Run your Policy Server in the cloud CSP-Ready Build your own NAC-as-a-Service
  • 4. In Genians We Trust North America 50 High Street, Suite 45 North Andover, MA, 01845 United States of America hello@genians.com +1-617-307-4090 East Asia ACE Pyeongchon Tower, 8th floor 361 Simindaero, Dongan-gu Anyang-si Gyeonggi-do, South Korea geni@genians.com +82-31-422-3823 Genians (KOSDAQ: 263860) reimagines Network Access Control by using Device Platform Intelligence to monitor the entire lifecycle of all network-connected devices to ensure the highest levels of IT security, availability, resilience, and agility. Genians is working to build a better security culture in the connected world by teaming up with global communities and industry leaders around the world. TOGETHER, MORE SECURE. Over the last 13 years, Genians has supported more than 1,100 customers around the world and secured millions of endpoint connections in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, energy, finance, healthcare, education, and beyond. Genians Named a Representative Vendor in Gartner 2018 Market Guide for Network Access Control “Thanks to Genians’ non-disruptive sensing technology powered by its Device Platform Intelligence, we can see what, who, when, where, and how is connected to our network. It’s ‘Crystal Clear’! This real-time visibility enables us to manage and enforce various types of endpoint devices more precisely and just in time. Yes, we are ready for the IoT era!”